GCIH Exam QuestionsBrowse all questions from this exam

GCIH Exam - Question 190


An analyst finds that a malicious program contains the instructions add 10, eax followed by sub 10, eax. What technique was the attacker likely using?

Show Answer
Correct Answer: AD

The attacker is likely using ghostwriting. This technique involves inserting meaningless or redundant instructions into a program's code to make static analysis more difficult. The instructions 'add 10, eax' followed by 'sub 10, eax' do not alter the overall state of the eax register, serving to confuse or obfuscate the true intention of the code.

Discussion

1 comment
Sign in to comment
anonyuserOption: A
Feb 12, 2024

Ghostwriting involves inserting meaningless or redundant instructions into a program's code to make static analysis more difficult. In this case, the attacker is adding and subtracting the same value to the register eax, which doesn't have any functional effect on the program's behavior but can confuse or obfuscate static analysis tools by altering the flow of instructions.